Rui Chang

Orcid: 0000-0002-0178-0171

According to our database1, Rui Chang authored at least 81 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Controllability and control for discrete periodic systems based on fully-actuated system approach.
Int. J. Syst. Sci., September, 2024

RSTFusion: an end-to-end fusion network for infrared and visible images based on residual swin transfomer.
Neural Comput. Appl., August, 2024

RDGMEF: a multi-exposure image fusion framework based on Retinex decompostion and guided filter.
Neural Comput. Appl., July, 2024

How recommendation letters affect career Mobility:Evidence from a social networking sites LinkedIn.
Comput. Hum. Behav., March, 2024

A Closer Look at the Security Risks in the Rust Ecosystem.
ACM Trans. Softw. Eng. Methodol., February, 2024

FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024

RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic Mapping.
IEEE Trans. Inf. Forensics Secur., 2024

kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels.
IEEE Trans. Dependable Secur. Comput., 2024

An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

The impact of manufacturing digital supply chain on supply chain disruption risks under uncertain environment - Based on dynamic capability perspective.
Adv. Eng. Informatics, 2024

Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
DOA Estimation Based on Coherent Integration-Sparse Bayesian Learning With Time-Variant Gain-Phase Errors.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

A Comprehensive Study on ARM Disassembly Tools.
IEEE Trans. Software Eng., April, 2023

High-Temperature Oxidation of Magnesium- and Iron-Rich Olivine under a CO2 Atmosphere: Implications for Venus.
Remote. Sens., April, 2023

A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization.
Clust. Comput., February, 2023

CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.
IEEE Trans. Dependable Secur. Comput., 2023

EnBinDiff: Identifying Data-Only Patches for Binaries.
IEEE Trans. Dependable Secur. Comput., 2023

Speech-Visual Emotion Recognition via Modal Decomposition Learning.
IEEE Signal Process. Lett., 2023

Refinement-based Modeling and Formal Verification for Multiple Secure Partitions of TrustZone.
Int. J. Softw. Informatics, 2023

Demystifying Pointer Authentication on Apple M1.
Proceedings of the 32nd USENIX Security Symposium, 2023

When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Lark: Verified Cross-Domain Access Control for Trusted Execution Environments.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

VeriReach: A Formally Verified Algorithm for Reachability Analysis in Virtual Private Cloud Networks.
Proceedings of the IEEE International Conference on Web Services, 2023

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

VDom: Fast and Unlimited Virtual Domains on Multiple Architectures.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Lunar Terrestrial Analog Experiment on the Spectral Interpretations of Rocks Observed by the Yutu-2 Rover.
Remote. Sens., 2022

PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot.
CoRR, 2022

A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system.
Concurr. Comput. Pract. Exp., 2022

Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware.
Concurr. Comput. Pract. Exp., 2022

Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

CaDeCFF: Compiler-Agnostic Deobfuscator of Control Flow Flattening.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices.
CoRR, 2021

Effects of Data Augmentation Method Borderline-SMOTE on Emotion Recognition of EEG Signals Based on Convolutional Neural Network.
IEEE Access, 2021

Seeds of SEED: H<sup>2</sup>Cache: Building a Hybrid Randomized Cache Hierarchy for Mitigating Cache Side-Channel Attacks.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Revisiting challenges for selective data protection of real applications.
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021

2020
Predictive network modeling in human induced pluripotent stem cells identifies key driver genes for insulin responsiveness.
PLoS Comput. Biol., 2020

Determining the base address of MIPS firmware based on absolute address statistics and string reference matching.
Comput. Secur., 2020

2019
Spectral clustering algorithm using density-sensitive distance measure with global and local consistencies.
Knowl. Based Syst., 2019

Density-sensitive fuzzy kernel maximum entropy clustering algorithm.
Knowl. Based Syst., 2019

Density-sensitive Robust Fuzzy Kernel Principal Component Analysis technique.
Neurocomputing, 2019

Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method.
Concurr. Comput. Pract. Exp., 2019

2018
A Multi-level Perception Security Model Using Virtualization.
KSII Trans. Internet Inf. Syst., 2018

Towards a multilayered permission-based access control for extending Android security.
Concurr. Comput. Pract. Exp., 2018

Temperature-Dependent Surface Charge and Flashover Behaviors of Oil-Paper Insulation Under Impulse With Superimposed DC Voltage.
IEEE Access, 2018

VTET: A Virtual Industrial Control System Testbed for Cyber Security Research.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Association Analysis of Firmware Based on NoSQL Database.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
MBSA: a lightweight and flexible storage architecture for virtual machines.
Concurr. Comput. Pract. Exp., 2017

A practical cross-datacenter fault-tolerance algorithm in the cloud storage system.
Clust. Comput., 2017

MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017

A compilation method for zero overhead loop in DSPs with VLIW.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

A Formal Android Permission Model Based on the B Method.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Exploring the Reproducibility of Probabilistic Causal Molecular Network Models>.
Proceedings of the Biocomputing 2017: Proceedings of the Pacific Symposium, 2017

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

An Effective Authentication for Client Application Using ARM TrustZone.
Proceedings of the Information Security Practice and Experience, 2017

Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Quarter-Century Offshore Winds from SSM/I and WRF in the North Sea and South China Sea.
Remote. Sens., 2016

A Case Study of Land-Surface-Temperature Impact from Large-Scale Deployment of Wind Farms in China from Guazhou.
Remote. Sens., 2016

An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Fine-Granular Programming Scheme for Irregular Scientific Applications.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

Enhancement of Permission Management for an ARM-Android Platform.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Offshore Wind Resources Assessment from Multiple Satellite Data and WRF Modeling over South China Sea.
Remote. Sens., 2015

Causal Inference in Biology Networks with Integrated Belief Propagation.
Proceedings of the Biocomputing 2015: Proceedings of the Pacific Symposium, 2015

2014
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
A Novel Knowledge-Driven Systems Biology Approach for Phenotype Prediction upon Genetic Intervention.
IEEE ACM Trans. Comput. Biol. Bioinform., 2011

Systematic Search for Recipes to Generate Induced Pluripotent Stem Cells.
PLoS Comput. Biol., 2011

2010
Novel algorithm for Bayesian network parameter learning with informative prior constraints.
Proceedings of the International Joint Conference on Neural Networks, 2010

A Novel Knowledge-driven Systems Biology Approach for Phenotype Prediction Upon Genetic Intervention.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

2009
Interference coordination and cancellation for 4G networks.
IEEE Commun. Mag., 2009

2008
Advanced probabilistic network modeling framework with qualitative prior knowledge.
PhD thesis, 2008

Quantitative Inference by Qualitative Semantic Knowledge Mining with Bayesian Model Averaging.
IEEE Trans. Knowl. Data Eng., 2008

Modeling semantics of inconsistent qualitative knowledge for quantitative Bayesian network inference.
Neural Networks, 2008

2007
Quantitative Bayesian Inference by Qualitative Knowledge Modeling.
Proceedings of the International Joint Conference on Neural Networks, 2007

A Knowledge-based Dynamic Bayesian Framework Towards Molecular Network Modeling and Quantitative Prediction.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2007

Consistent Modeling, Integration and Simulation of Molecular Interaction Networks in Space-Time Dimension.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007


  Loading...